Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.


iPhone gets first free app for encrypting voice calls

Signal is compatible with RedPhone, its Android sibling

Internet of things devices contain high number of vulnerabilities, study finds

Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices

In a hyper-social world, some seek a little privacy

People are getting more selective about what they want to share, and online firms are picking up on it

Antivirus products riddled with security flaws, researcher says

Antivirus products increase a computer's attack surface and may even lower operating system protections, a security researcher claims

Hacker group targets video game companies to steal source code

The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said

No patch yet for zero day in Symantec Endpoint Protection software driver

Symantec has published recommendations for mitigating the danger

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

'Right to be forgotten' ruling is unworkable and misguided, UK Lords say

The UK government should fight to keep the 'right to be forgotten' out of future EU data protection regulation, the Lords said

Zero-day flaws found in Symantec's Endpoint Protection

Offensive Security said the flaws could be used to gain full system access

Canada blames China for cyber intrusion at National Research Council

The attack was carried out by highly sophisticated state-sponsored hackers, the government of Canada said

Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said

Senator pushes new version of bill to limit NSA phone records collection

Leahy reintroduces the USA Freedom Act in an effort to strengthen the bill that passed the House

BlackBerry focuses on security for the enterprise

BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says

Instagram is moving to full https encryption but isn't there just yet

Privacy groups call for action to stop Facebook's off site user tracking plans

Authorities should act immediately to stop this new vast expansion of Facebook's data collection and user profiling, privacy groups said

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are targeting Amazon EC2 instances with Elasticsearch 1.1.x installed

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned

Until the Tails privacy tool is patched, here's how to stay safe

Patches are ready for IP2, the vulnerable component in Tails, but it's not clear when Tails will update

Load More